Endpoint Protection for Business Features

Read what people say are the most valuable features of the solutions they use.
Karthik Balakrishnan says in a Carbon Black CB Defense review
Senior Security Consultant at a manufacturing company with 10,001+ employees
Carbon Black Defense has a higher detection ratio because it's cloud-based and it also does a lookup to virus total, so it is out of like 65 vendors that are normally listed in virus total, if there are any kind of hits out of those, in that case, it is getting recognized as a known Malware or a suspected Malware. Under these categorizations, we are able to see a spike in the detection ratio. It is enlightening us with respect to what are the programs that are generally used in our environment and how they are compliant with our environment. View full review »
ManegeiT677 says in a Bitdefender GravityZone review
IT Manager at voluntis
The features that are most useful are the simplicity of deploying the package and the cryptosystem for managing all the situations on the computer. View full review »
Malware Hunter and Incident Responder at Computer Network Systems
In Symantec Endpoint Protection, the most valuable feature I like is the good performance. With Symantec, I always know this tool will be reliable and with the latest protection. View full review »
General Manager at a tech services company with 11-50 employees
I find QRadar and the Active Threat Defense the most valuable. The ATP, Active Theft Protection, is very good. They've got very solid detection rates from P2. Those and some of the other programs are very valuable. View full review »
Sven Aurich says in a Cylance review
Wirtschaftsprüfer, CPA, Steuerberater at a financial services firm with 11-50 employees
The most valuable feature is that it's quite small, and does not consume too many system resources. View full review »
Enterprise Architect at Aurenav Sweden AB
If you open up an application or a web browser, it runs within a container (sandbox). So if there's some malicious code, it' will be contained within the sandbox. Ransomware prevention and zero-day exploits were a driver for adopting Comodo. From our research lab results working with live ransomware, Comodo has been very effective in preventing infection. We've done a lot of tests with numerous types of live malware, and it works really well. View full review »
John Livinston says in a BigFix review
CEO at Verve
The ability for the agent to be customized, to both, run the fix list and the relevant language, but also to be able to be designed so that it only allows for outbound ports rather than inbound is the most valuable feature. We work in a lot of environments where there are segmented networks and we have to have an agent and a communication where we don't have any inbound ports into that environment. Having that agent be really small, and the ability to not have to have any open inbound ports into that environment is wonderful. View full review »
Michelle McGough says in a BigFix review
BigFix Offering Manager at a tech services company
The subscription patch content was the most useful because it made patching a lot easier, faster, and more successful than alternative options requiring prescans and custom code development. View full review »
Ilan Amir says in a Nyotron PARANOID review
Global IT Manager at a pharma/biotech company with 501-1,000 employees
First of all, it does the job. It prevents harm to the operating system. Also, the visibility it gives to the user and to the administrator is very good, it provides visibility in a very convenient, easy way. View full review »
Jayandra Wickramasinghe says in a Carbon Black CB Defense review
Senior Systems engineer at a tech services company
Carbon Black Cb Defense has a nice component called Alert Triage. It has helped to detect threats across the data. It contains full details of the process execution "kill chain" and "go live" for immediate remediation. View full review »
Leonardo Meneses says in a Carbon Black CB Defense review
Incident Response Analyst at a security firm with 51-200 employees
The go live, because it is possible to answer incidents while they are still occurring and minimize the effects. View full review »
Brody Wright says in a Carbon Black CB Defense review
System Analyst at a hospitality company with 1,001-5,000 employees
* The software uses very few resources; it is almost invisible to the end user. * Behavioral Monitoring stops known malicious events before they even begin. * The whitelist: Being a Casino, we have some odd software packages. Being able to whitelist them is a must. * The option to quarantine a device and use the cloud-based portal to gain a “shell” on the infected machine. With this, we can dump the entire system memory to a machine in our lab, then run analysis. View full review »
Principal Consultant - Security at Insentra
There are a number of features that all work synergistically to be able to provide the protection. Originally, anti-virus was based on definition. About 10 years ago, the bad guys figured out how to get past that. So what they've been doing for the past 10 years is adding in additional features to help mitigate any of these other attack vectors that the hackers or malicious people have. So it's just a working together of all these components that makes it special. And then SEP itself fits into the Symantec ecosystem, and inter-operates with a number of other technologies to provide a comprehensive security portfolio. I think the key thing for me, is interoperability, in that you can deploy it to Windows, Mac, and Linux. That's been a really important feature in the last two years. Now there's one management console to cover all three OSs. There are two key aspects to how it has improved. One is the threats that it protects the organization from versus the amount of resource utilization; and two is that compatibility has increased. View full review »
Andrew S. Baker (ASB) says in a Cylance review
Cybersecurity & IT Professional (VirtualCIO) at a tech services company with 1-10 employees
The CylancePROTECT agent is very low on CPU usage, so it has virtually no adverse impact on my servers, desktops, or workstations. I am also quite impressed with its ability to protect systems against zero-day threats due to the machine learning algorithm, which powers its database. Databases, as old as 2015, are able to accurately detect 2017-era threats, such as WannaCry and other ransomware. View full review »
MartinCarnegie says in a BigFix review
Senior Consultant at a tech services company with 10,001+ employees
* Patching support: IBM BigFix supports most of the major OSs with natively packages patches. This includes Windows, MacOSX, Oracle Linux, Solaris, AIX, RedHat, Ubuntu and others. * Pre-packaged support for many third-party applications such as Adobe, Google, Mozilla, Sun (Java), WinZip, and others. * Near real-time view of the environment. Most systems will report their current patch state within 15 minutes. * The IBM BigFix console provides a single pane view into the entire environment. This also provides a common interface for taking actions, such as patching, to any operating system with a similar look and feel. * Ease of installation, maintenance and troubleshooting. IBM BigFix is one of the easiest tools to install for an Endpoint Management tool, especially compared to IBM’s predecessors and Microsoft’s SCCM. As an example, the first time installing IBM BigFix in my lab with about 10 systems took approximately one hour from start of installation to applying OS patches. IBM BigFix is also very easy to scale by adding new relays. The design is flexible enough to be able to “add as you go” without having to perform a major architectural review. * For troubleshooting, the log file structure is very simple, as most files are in the same place and have a standard format. * Adding new components such as IBM BigFix Compliance or IBM BigFix Inventory does not require new agents to be installed. By enabling the content, by clicking on a hyperlink in the License Management Dashboard, and taking action with a couple packages, the infrastructure is ready to start gathering more information. * Reporting capabilities: With the IBM BigFix console, I am able to quickly provide information to any group. With the use of the IBM BigFix Web Reports, I am able to design reports that I can save and provide to users to execute when they desire. These reports can also be scheduled to run and email the users. View full review »
Director at a tech services company with 11-50 employees
It is easy to implement and very stable. The AV device control and HIPS are very impressive. Just implement it and it's done. No troubleshooting efforts are required to make the policies work. View full review »
Alex Clerici says in a Sophos EPP Suite review
System Integrator IT Manager at Tecnimex srl
The most valuable feature is the ability to centrally manage the total security environment, including the firewall. This solution integrates well with the other Sophos components. Together, they provide synchronized security. View full review »
NisasMoidu says in a Sophos EPP Suite review
Administrator Assistant at GEMS
The protection that this solution offers us is strong. View full review »
seniorse527517 says in a Sophos Intercept X review
Senior Security Consultant - Checkpoint Technologies at a tech services company with 51-200 employees
The forensics within the solution are quite good. The ransomware mitigation is also impressive. View full review »
Owner at Giliam Network & System Solutions
The most valuable feature of this solution is the VPN. View full review »
reviewer725523 says in a Sophos EPP Suite review
General Manager at a tech services company with 11-50 employees
Intercept X is the most valuable feature in the solution. It's more or less pretty standard. The endpoint feature allows you to basically see what is happening, and stop a wide range of threats. It's been the most unique identifier for Sophos. View full review »
reviewer826284 says in a Microsoft Windows Defender review
MIS Director at a real estate/law firm with 5,001-10,000 employees
The most valuable feature is that we can use the solution right out of the box without too much configuration. View full review »
LuukRos says in a Sophos Intercept X review
Consultant at a tech services company with 5,001-10,000 employees
The most valuable features are the range and restriction. This is why our users choose Intercept X. View full review »
Tony Tuite says in a SentinelOne review
Consultant with 51-200 employees
The fact that this runs using AI instead of heuristics provides the best protection I've seen. It has the ability to rollback a ransomware infection instantly and with minimal disruption to the user & provides robust reporting. I tested this by deliberately infecting an unpatched test machine with WanaCry. First of all, SentinalOne blocked the initial infection attempt. I had to put S1 into "notify only" mode on that system to actually infect the machine. Once infected, WanaCry did what it does... encrypted all the documents I had copied to the test machine and put up the background. We immediately got a notification on our dashboard that a system was infected. At the same time, we got a popup on the client machine notifying us of the infection, with the option to auto-repair the damage. It took less than a minute (granted, we only had about 200 MB of files on the test system) for S1 to repair the damage and put the machine back to normal with no evidence of the infection. You also can't remove the client from the local machine without approving it within the dashboard. This is a nice feature to prevent tampering by either hapless users or even skilled threat actors. View full review »
ShabeerRamsingh says in a Cylance review
Head of Strategic Business Development at Grove
Cylance protection is the solution’s most valuable feature. Every aspect of the solution is great, however. It’s why I sell it. Everything is there. View full review »
Sign Up with Email